CVE-2006-6101

Source
https://cve.org/CVERecord?id=CVE-2006-6101
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2006-6101.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2006-6101
Downstream
Related
Withdrawn
2026-01-27T04:07:33.588832Z
Published
2006-12-31T05:00:00Z
Modified
2026-01-27T04:07:33.588832Z
Summary
[none]
Details

Integer overflow in the ProcRenderAddGlyphs function in the Render extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of glyph management data structures.

References

Affected packages